Method for simultaneous detection of a plurality of RFID tags using multiuser detection
09769547 · 2017-09-19
Assignee
Inventors
Cpc classification
H04Q9/00
ELECTRICITY
H04Q2209/753
ELECTRICITY
International classification
Abstract
A method and apparatus are disclosed that apply multiuser detection (MUD) analysis to an aggregated RF response from a plurality of simultaneously queried RFID tags, so as to distinguish the individual tag responses. The claimed method thereby significantly reduces RFID detection latency when multiple tags are simultaneously queried. Some embodiments transmit carrier waves at more than one frequency, such as a plurality of equally-spaced frequencies, so as to enhance the MUD analysis by incorporating a multi-frequency dimension. Other embodiments incorporate additional spatial dimensions by deploying multiple RF detection antennae at separated locations. The number of colliding tag responses must be estimated before MUD analysis can be applied. In some embodiments other signal parameters must be estimated, such as signal bias and an impulse function for each responding tag that characterizes alterations of the RF signal while in transit due to propagation distance, passage through intervening objects, and reflections.
Claims
1. A method for distinguishing responses received by an RFID detector from a plurality of simultaneously queried RFID tags, the method comprising: querying the plurality of RFID tags; receiving an aggregated RF response from the plurality of RFID tags; characterizing the aggregated RF response according to a plurality of characteristics, the plurality of characteristics including at least RF amplitude and RF phase; according to the characterization of the aggregated RF response, estimating at least one parameter, the at least one parameter including a number of RFID tag responses included in the aggregated RF response; and applying multiuser detection including jointly demodulating a plurality of colliding RFID tag responses included in the aggregated RF response according to the at least one estimated parameter so as to distinguish each of the RFID tag responses included in the aggregated RF response.
2. The method of claim 1, further comprising repeating the steps of querying, receiving, characterizing, estimating, and applying until the responses of all of the plurality of simultaneously queried RFID tags have been distinguished.
3. The method of claim 1, wherein the at least one parameter includes a signal bias.
4. The method of claim 3, wherein the signal bias is estimated by averaging a bias of the aggregated RF response over a plurality of symbol intervals.
5. The method of claim 3, wherein the estimated signal bias is subtracted from the aggregated RF response preceding further analysis of the aggregated RF response.
6. The method of claim 1, wherein estimating the number of RFID tag responses included in the aggregated RF response includes applying a statistical analysis method so as to detect clustering of the aggregated RF response, as characterized according to the plurality of characteristics.
7. The method of claim 6, wherein the statistical analysis method comprises one of: a K-Means algorithm; a Maximum likelihood solution; and a T test.
8. The method of claim 1, wherein: the aggregated RF response includes a plurality of unique identifying sequences transmitted simultaneously by each of the responding RFID tags, the identifying sequences being statically independent of each other, and estimating the number of RFID tag responses included in the aggregated RF response includes counting a number of unique eigenvalues in a covariance matrix derived from a portion of the aggregate RF signal that includes the simultaneously transmitted identifying sequences.
9. The method of claim 1, wherein for each of the RFID tags that contributed to the aggregated RF response, the at least one parameter includes a corresponding channel impulse response function that characterizes an alteration of an RF response from the corresponding RFID tag during transit of the RF response from the RFID tag to the RFID detector.
10. The method of claim 1, wherein: receiving the aggregated RF response from the plurality of RFID tags includes simultaneously transmitting to the plurality of RFID tags a plurality of RF carrier waves at a plurality of RF frequencies; and characterizing the aggregated RF response according to a plurality of characteristics includes characterizing the aggregated RF response according to frequency.
11. The method of claim 10, wherein the plurality of RF carrier waves is a plurality of equal amplitude RF carrier waves, and the plurality of RF frequencies is a plurality of equally spaced RF frequencies.
12. The method of claim 1, wherein: receiving the aggregated RF response from the plurality of RFID tags includes obtaining a plurality of spatially separated responses received using a plurality of spatially separated RF receiving antennae; and characterizing the aggregated RF response according to a plurality of characteristics includes characterizing the aggregated RF response according to the plurality of spatially separated responses.
13. An apparatus for distinguishing responses received from a plurality of simultaneously queried RFID tags, the apparatus comprising: an RF transmitter configured to transmit a querying RF signal to the plurality of RFID tags; an RF receiver configured to receive an aggregated RF response from the plurality of RFID tags; an RF characterizer configured to characterize the aggregated RF response according to a plurality of characteristics, the plurality of characteristics including at least RF amplitude and RF phase; and a computer controlled by software configured to direct the computer to estimate at least one parameter pertaining to the characterized aggregated RF response, the at least one parameter including a number of RFID tag responses included in the aggregated RF response, the software being further configured to direct the computer to apply multiuser detection including jointly demodulating a plurality of colliding RFID tag responses included in the aggregated RF response according to the at least one estimated parameter, so as to distinguish each of the RFID tag responses included in the aggregated RF response.
14. The apparatus of claim 13, wherein the at least one parameter includes a signal bias.
15. The apparatus of claim 14, wherein the signal bias is estimated by averaging a bias of the aggregated RF response over a plurality of symbol intervals.
16. The apparatus of claim 14, wherein the estimated signal bias is subtracted from the aggregated RF response preceding further analysis of the aggregated RF response.
17. The apparatus of claim 13, wherein estimating the number of RFID tag responses included in the aggregated RF response includes applying a statistical analysis method so as to detect clustering of the aggregated RF, as characterized according to the plurality of characteristics.
18. The apparatus of claim 17, wherein the statistical analysis method comprises one of: a K-Means algorithm; a Maximum likelihood solution; and a T test.
19. The apparatus of claim 13, wherein: the aggregated RF response includes a plurality of unique identifying sequences transmitted simultaneously by each of the responding RFID tags, the identifying sequences being statically independent of each other; and estimating the number of RFID tag responses included in the aggregated RF response includes counting a number of unique eigenvalues in a covariance matrix derived from a portion of the aggregate RF signal that includes the simultaneously transmitted identifying sequences.
20. The apparatus of claim 13, wherein for each of the RFID tags that contributed to the aggregated RF response, the at least one parameter includes a corresponding channel impulse response function that characterizes an alteration of an RF response from the corresponding RFID tag during transit of the RF response from the RFID tag to the RFID detector.
21. The apparatus of claim 13, wherein: the RF transmitter is able to simultaneously transmit to the plurality of RFID tags a plurality of RF carrier waves at a plurality of RF frequencies; and the software is able to direct the computer to characterize the aggregated RF response according to the plurality of RF frequencies.
22. The apparatus of claim 13, further comprising a plurality of spatially separated RF receiving antennae that are able to receive the aggregated RF response as a plurality of spatially separated responses, the software being able to direct the computer to characterize the aggregated RF response according to the plurality of spatially separated responses.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
DETAILED DESCRIPTION
(12) Based on current RFID designs, a problem occurs when a plurality of RFID tags is simultaneously queried by an RFID detector, for example a plurality of RFID tags that are attached to each product carried by a shipping pallet. In such a case the detector will receive a nearly simultaneous response from every tag that is located within its detection range, resulting in collisions of the data packets transmitted by the tags. Prior art approaches have implemented protocols that cause packets to transmit their information at random times, and to re-transmit until a collision-free transmission is achieved. The present invention applies Multi-User Detection (“MUD”) to distinguish overlapping packets, thereby reducing or eliminating the need for random delays and/or re-transmissions.
(13) Signal Model
(14) So as to understand how the present invention solves this problem, it is helpful first to understand the physics and define a representative signal model that incorporates collisions from multiple tag responses. To start we define the signal model for a single tag scenario and then we extend it to the case where multiple tag responses collide.
(15) The RF signal is initially transmitted as a query signal 104 to the RFID tag 100. This “forward” signal is modified in transit according to a forward impulse response function 302 h.sub.f.sup.BP(t) due to the distance traveled by the RF query signal 104, and possibly also due to passage through and/or reflection from intervening objects, and such like. After transmission of the RF query 104, the RFID detector 102 continues to transmit an unmodulated carrier wave 112.
(16) As shown in
(17) This process can be mathematically modeled according to the following equations. The complex baseband received signal y(t) is defined as
(18)
which can be reduced with no loss of generality to
(19)
where m denotes the symbol index and M denotes the total number of symbols. In equations 1 and 2, ω(t) denotes the complex baseband white Gaussian noise process defined as
ω(t)=ω.sup.BP(t)e.sup.−jωt (3)
and h(t) denotes the complex baseband composite channel impulse response defined as
h(t)=p(t)*(γh.sub.r.sup.BP(t)e.sup.−jωt), (4)
where γ=(βe.sup.jωt*h.sub.f.sup.BP(t))e.sup.−jωt is a complex gain. For the purpose of this discussion we assume the return channel h.sub.r.sup.BP(t) is multipath free and is therefore represented as a single tap FIR filter. This allows us to represent the baseband equivalent propagation channel as (γh.sub.r.sup.BP(t)e.sup.−jωt)=αδ(t), which allows h(t) to be rewritten as
h(t)=αp(t). (5)
(20) This assumption holds when the distance between the RFID detector and the tag is less than a few wavelengths which is the case for many RFID tag applications. Though this description assumes a single tap channel, this model can easily be extended to assume a multipath channel. We also assume the symbols transmitted by the retro-reflective tags are spread with a zero mean spreading sequence {s.sub.n}.sub.n=1.sup.N like a Manchester code. In ASK modulation, this enables accurate estimation and removal of the bias term on the received signal as will be discussed in a later section. This spreading sequence can be modeled as part of the symbol waveform defined in
(21)
where N is the length of the spreading sequence, T.sub.c is the chip period, and g(t) is the chip waveform. Because the modulation scheme is ASK, the elements of the transmitted symbol sequence d(m) are constrained to the set {±1+ψ} where ψ is an arbitrary but fixed complex offset that is based on the reflection coefficient of the tag when sending binary symbols b.sub.m ε{±1}. It is assumed that the complex gain due to the reflection coefficient of the tag is already incorporated in the reverse channel model h.sub.r.sup.BP(t). From this definition, equation (2) can be rewritten as
(22)
Substituting (6) into (7) yields
(23)
(24) On sampling the complex baseband received signal y(t) at the chip rate T.sub.c during the reception of a single symbol b.sub.m and assuming g(t) is a unit energy Nyquist pulse, (8) can be written as follows with no loss in generality
y=sαb.sub.m+1α.sub.o+w (9)
where y is the N×1 received signal vector sampled at the output of the chip matched filter, s is the N×1 spreading sequence, 1 is an N×1 all ones vector, α.sub.o=αψ+β and w is the complex Gaussian white noise process with covariance σ.sup.2I.
(25) This single tag model can now be easily expanded to the situation where K tag responses collide. Because the time base for every tag is obtained through the RFID detector reference signal, and because the propagation delay is short relative to a symbol duration, all the colliding tag responses are assumed to be symbol and packet synchronous. This allows us to represent the signal model as the sum of K received vectors.
(26)
where k denotes the user index, S is the N×K spreading matrix whose k.sup.th column is S.sub.k, A=diag{α.sub.1, . . . , α.sub.K}, b=[b.sub.m1 . . . , b.sub.mK].sup.T, Φ is an N×K all ones matrix and a.sub.o=[α.sub.o1 . . . , α.sub.oK].sup.T.
(27) Conventional Demodulation
(28) RFID tag systems today employ conventional demodulators to estimate the symbols transmitted from a single tag. This is accomplished by first estimating and removing the bias on the received signal defined in (9) as follows
(29)
(30) We note that E{sαb.sub.m}=0 because, as described above, the spreading sequence s is assumed to be zero mean. From here the complex amplitude α must be estimated. This can be performed using data-aided or non-data-aided maximum likelihood techniques as described in H. Meyr, M. Moenclaey, and S. Fechtel. Digital Communication Receivers. Wiley, New York, N.Y., 1998, herein incorporated by reference.
(31) Once signal parameters have been estimated, a matched filter is used to estimates the bits as follows:
(32)
(33) This approach yields the optimal solution for the reception of a single tag response. However, as soon as there are collisions, as modeled in (10), this solution no longer holds. In fact, in most cases this solution will fail. This failure is due to the large amount of interference from colliding tags caused by a high correlation between the spreading sequences {s.sub.k}.sub.k=1.sup.K, as described in S. Verdu. Multiuser Detection. Cambridge University Press, 1998, incorporated herein by reference.
(34) Multi-User Detection
(35) The present invention uses multiuser detection (“MUD”) analysis to extract and differentiate the transmitted symbols from each of a plurality of colliding packets transmitted simultaneously by a plurality of RFID tags. The details of various multiuser detection analysis methods are presented in references cited below and incorporated herein by reference. Fundamentally, these MUD analysis methods capitalize on differences in signal parameters that apply to the plurality of RFID tags, and exploit these differences so as to differentiate the RFID tag signals from each other. For example, differences in the relative distances and orientations of the RFID tags, as well as differences regarding the number and types of intervening objects, will cause signals from otherwise identical RFID tags to arrive at the RFID detector at slightly different times and with differing amplitudes and phases. There may even be more complicated time-dependent behavior that differentiates the RFID tags, for example if some of the signals are reflected from various objects. In general, the various signal parameters are used as analytical “dimensions” into which the signals from the different RFID tags are separated and thereby distinguished.
(36) Based on this general approach, and on the signal model defined in equation (10), it is therefore clear that in order to estimate the transmitted symbols from each colliding packet, one must first estimate the signal's parameters.
(37) Signal Bias Estimator
(38) In the multiuser scenario modeled in equation (10), the bias term can be estimated 400 and removed 408 by subtracting the expected value from the received signal vector r. This is the same approach used in the conventional demodulation approach applied to the single tag scenario described above.
(39)
(40) We note that E{SAb}=0 because, as described according to the basic signal model above, each tag's spreading sequence {s.sub.k}.sub.k=1.sup.K is assumed to be zero mean. In practice the expected value of E{r} is estimated by averaging r over several symbol intervals.
(41) Number of Collisions Estimator
(42) With multiple colliding packets the usual method for identifying the number of transmitting sources, namely to count the number of unique eigenvalues of the received signal covariance matrix, will not work. Since the number of symbols being transmitted is relatively small, and since the signals themselves come from a finite alphabet, there is a non negligible probability that some of the signal eigenvalues will be indistinguishable from the noise eigenvalues. As such, this limitation also precludes the use of noise subspace identification methods like MUSIC when the channel is not assumed known and must be estimated.
(43) From equation (10) and the assumptions on the channel, it is assumed that our received signals will arrive in somewhat well defined paired clusters. Since each of these clusters will represent a unique interference pattern for the signal, we can find the number of transmitting tags by using a Number of Collisions Estimator 402 to take log.sub.2 of the number of clusters and to count and identify the centroids of these clusters by employing statistical analysis clustering techniques. While other and various techniques are within the scope of the invention, three examples of these clustering techniques are:
(44) K-Means algorithm
(45) Maximum likelihood solution
(46) T test
(47) For each approach it is assumed that the spreading sequence on each symbol for each user is differentially encoded, for example Manchester encoded, where {s.sub.k}.sub.k=1.sup.K=[1, −1].sup.T. This follows the ISO 18000-6 standard (see International Organization for Standardization, Information Technology, Radio Frequency Identification for Item Management—Part 6: parameters for Air Interface Communications at 860 MHz to 960 MHz, 1st edition, 2004, incorporated herein by reference). These solutions also hold for any other differential encoding scheme, such as FMO coding, that is used in the EPC Global standard (see EPCglobal Inc. Specification for RFID Air Interface, EPC Radio-Frequency Identity Protocols Class-l Generation-2 UHF RFID Protocols for Communications at 860 MHz-960 MHz, Version 1.0.9, 20, incorporated herein by reference).
(48) We begin by defining r.sup.(0) and r.sup.(1) to be the elements of r, which, as described above, correspond to the chip match filter outputs. We also define b.sup.(0) and b.sup.(1) to be the equivalent input bits for r.sup.(0) and r.sup.(1) respectively (b.sup.(0)=b and b.sup.(1)=−b). In the absence of destructive interference, we can assume that r.sup.(i) is monotonically increasing with respect to the amplitudes of A. Now, we define the following received cloud classes:
C.sub.j={r.sup.(i)|b.sup.(i) contains j 1's and (κ−j)−1's}
(49) If we sort the received clouds by their power, then, using our assumption, we find the first received cloud belongs to C.sub.o and the next κ ordered power clouds belong to C.sub.j.
(50) K-Means Algorithm
(51) Briefly stated, the K-Means algorithm tries to minimize the objective function given by
(52)
where the summand is the distance between the point x.sub.i with prior classification j and the j.sup.th centroid. Here κ is specified as input. The algorithm works by positing a guess for the initial values of C.sub.J and then iterating between the two steps below until convergence:
(53) assign each point x.sub.i to the cluster with the nearest centroids; and
(54) recompute the centroid of each cluster;
(55) The K-Means algorithm itself is not intended to find the number of clusters in a data set. However, there are certain optimality criteria (Schwarz Criterion etc) which can identify κ using the values for J in (14). These criteria work relatively well for large data sets, as shown in
(56) Maximum Likelihood Solution
(57) The maximum likelihood solution takes advantage of the features specific to the RFID clustering problem. These features are:
(58) the variance of each cluster is known and constant throughout all clusters (Noise Power);
(59) there is a 1-1 correspondence between each cluster and its ASK equivalent inverse cluster (From Manchester encoding); and
(60) for large data sets, each cluster will have roughly the same number of elements (Uncorrelated source signals).
(61) For current RFID protocol standards such as EPC Global or ISO 18000-6 the length of the RFID serial number field may not be long enough to satisfy the last condition. However, for new standards this can be fixed by increasing the length of the serial number field. To make use of all the known information given above we compare the likelihood that each block and its Manchester dual came from the Gaussian distribution of its nearest neighbors against the likelihood that the new blocks and the prior clusters came from a mixture density. Mathematically, we choose the null hypothesis if
(62)
where:
(63) n, m, I are indices of the Manchester encoding, received symbol and mixture respectively;
(64) r.sub.m.sup.n is the m.sup.th observation of r which either belongs to or is hypothesized as belonging to the cluster centered around μ.sup.m;
(65) ω.sub.i is the weighting factor for mixture densities (assumed to be 0.5 for two-mixtures);
(66) μ.sub.0.sup.n is the recomputed sample mean of the received block of data together with its nearest cluster;
(67) μ.sub.1.sup.n is the sample mean of the received data block; and
(68) μ.sub.2.sup.n is the sample mean of the closest existing cluster to the received data block.
(69) T Test
(70) A slightly modified T test may be employed to check whether a received block belongs to a previously received cluster. Recall that the test statistic used to determine if two sample sets, A and B, arose from the same distribution is given by
(71)
where σÂB is the empirical pooled standard deviation. t is distributed according to the t distribution and the probability of type I error is given by the incomplete beta function
(72)
where ν=n.sub.A+n.sub.B−2 is the degrees of freedom, β is the β function and H.sub.1 is the hypothesis that the samples came from two distributions. Thus, if the type I error falls below a certain predefined threshold, we choose H.sub.1.
(73) A clustering algorithm, then, proceeds as follows.
(74) Upon receiving a new symbol block, find all the existing clusters within 2σ of the sample mean of the new block.
(75) Perform a T test against each of the existing clusters.
(76) If H.sub.1 is returned, verify by checking whether the pooled variance of the block with each existing cluster comes closer to the known noise power with the addition of the new block.
(77) For clusters returning H.sub.0,t test their Manchester inverse clusters with the next received block of symbols, which is the Manchester inverse of the prior block.
(78) Choose to merge the blocks into the clusters that yield the smallest average type I error, where the average is taken across the Manchester clouds. If this error is above the threshold, define two new clusters with the Manchester blocks as their elements.
(79) An alternate approach to estimating the number of collisions is to add a unique training sequence or serial number to each tag that is statically independent from each other sequence. This will increase the overhead per packet reducing overall data rate but will enable the use of subspace techniques such as the MUSIC algorithm or other techniques that count the number of unique eigenvalues of the received signal covariance matrix over measured over only the period of each packet where the training sequences or serial number fields overlap.
(80) Multiuser Channel Estimator
(81) Based on the received signal model defined in equation (10) the channel for each tag is modeled by the Multiuser Channel Estimator 404 as a complex gain α.sub.k incorporated into the diagonal matrix A. To estimate the diagonal elements of A, we only need know which clouds belong to the classes C.sub.0 and C.sub.1. The process is straightforward. Let r.sub.j be a member of C.sub.j. Then
E(r.sub.1−r.sub.0)=SA.Math.2e.sub.k (18)
where e.sub.k is the unit vector on the k.sup.th basis. Thus, we can derive the K diagonal elements of the diagonal matrix A from taking the sample mean of the κ cloud differences.
(82) Multiuser Detector
(83) Once the signal bias is removed and the number of colliding packets is estimated and each packets channel response is computed, a multiuser detection receiver 406 is employed to jointly demodulate the bits from each users packet.
(84) As illustrated in
(85)
where ψ.sup.K is the K dimensional set of all possible symbol hypotheses.
(86)
(87) Methodfor Incorporating Frequency and Spatial Diversity
(88) It was mentioned previously that in general, the various signal parameters are used as analytical “dimensions” into which the signals from the different RFID tags are separated and thereby distinguished. In some embodiments of the present invention, additional diversity is incorporated into the received RFID tag signals 110 by transmitting the carrier wave 112 on more than one frequency and/or by using a plurality of spatially separated antennae to receive the signals 110.
(89) In particular, with reference to
(90)
where ζ is the free space attenuation constant and c is the speed of light.
(91) A typical complex gain α.sub.k(f) is presented as a function of frequency for three separate RFID tags in
(92) To impart this frequency diversity an interrogator may be used that transmits at several distinct frequencies 700 all Δf Hz apart 702. In a realizable system the number of frequencies P and the difference between frequencies Δf should be selected based on the assumed range distribution of the tags relative to the interrogator. P should be selected relative to the mean of the set {l.sub.k}.sub.k=1.sup.K because P is directly proportional to the maximum resolvable distance l.sub.max. To provide more optimal diversity gain it is desired to increase the total frequency range Δf as much as possible because Δf is inversely proportional to the resolvable distance resolution Δl. To understand how this frequency diversity is incorporated into the parameter estimation and multiuser detection algorithms we rewrite equation (10) to incorporate the added frequency diversity as follows:
{hacek over (r)}={hacek over (S)}{hacek over (A)}b+{hacek over (Φ)}{hacek over (a)}.sub.o+{hacek over (w)} (21)
where {hacek over (r)} is the NP×1 received signal vector, {hacek over (S)} is the NP×KP block diagonal matrix where each block diagonal component is S, {hacek over (A)}=[A(1).sup.T, . . . , A(P).sup.T].sup.T, A(f)=diag{α.sub.1(f), . . . , α.sub.K(f)}, {hacek over (Φ)} is an NP×KP block diagonal matrix with block diagonal elements φ, {hacek over (α)}.sub.0 is a KP×1 vector of complex offsets α.sub.okf, and {hacek over (w)} the NP×1 white Gaussian noise vector.
(93) From this model neither the bias estimator nor the multiuser channel response estimator will change. However, there will be a unique estimate for each at each frequency. This can be obtained by passing the elements of r into each one frequency at a time. The number of collisions estimator will not change but now the clustering will be performed in a 2P dimensional space instead of the 2-dimensional complex plane. The multiuser detector algorithm will remain unchanged but its performance will greatly increase due to the reduced cross correlation between colliding packets.
(94) It is important to note that similar gains can be obtained by incorporating spatial diversity into the RFID detector by adding multiple antenna elements to the receiver chain in different physical locations. In this case, the array spacing affects diversity. The system model for this approach also reduces to the same model defined above for adding frequency diversity. In this case the algorithms will perform just as described above.
(95) By employing frequency or spatial diversity techniques described above the correlation between each colliding tag is reduced. This increased the performance of any algorithms used to estimate the number of collisions and the channel response. It also improves the performance of any multiuser detector.
(96) The foregoing description of the embodiments of the invention has been presented for the purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed. Many modifications and variations are possible in light of this disclosure. It is intended that the scope of the invention be limited not by this detailed description, but rather by the claims appended hereto.